1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Over [174]
3 years ago
12

I have been charged for brainly plus yet I still have to watch ads why? What do I do?

Computers and Technology
2 answers:
aksik [14]3 years ago
7 0

Answer:

<h2>try contacting <em><u>BRAINLY</u></em></h2>

Explanation:

UNO [17]3 years ago
4 0
Ummmmmmmmm make a new account
You might be interested in
Information systems security is the collection of activities that protect the information system and the data stored in it.
ivann1987 [24]

Answer:

The answer is A. True.

Explanation:

Information systems security,refers to all the methods involved with assuring information integrity as well as keeping it confidential, and available.

It can also be defined as -

The detection and provisoon of solutions to security breaches.

Access controls, which prevents unauthorized system access.

Protection of information either in transit or in a storage area.

3 0
3 years ago
Alright, so im currently trying to pass a computer science class. i need it done in a little under 2 weeks. Ill just ask the one
Alla [95]

Answer:

B. Mesh

Explanation:

5 0
3 years ago
Whats a field in databases?
SVETLANKA909090 [29]
A field is a single attribute of an entity, object or event.
3 0
3 years ago
How do you protect the server from modification by non-root users?
Elis [28]

Answer:

We can protect the server from the modification by using the non root users in many ways as follows:

  • By modifying the PHP settings in the server and by using the configured file as, the configuration of the file is basically depend upon the linux and the PHP script.
  • By disabling the URL from the function of file handling that basically accept the local file as the parameters but it also accept the URL.  It can even now get to outer destinations by utilizing fsockopen or any of the CURL capacities.
  • The safe mode  of PHP is presumably probably the best alternative to secure your server however it very well may be prohibitive. Whenever initiated, experimental mode averts access to records not claimed by Apache and access to condition factors and execution of double projects are likewise debilitated.

4 0
3 years ago
To format the legend on the chart, use the ____
cupoosta [38]
The correct answer for the question that is being presented above is this one: "c. Legend gallery." <span>To format the legend on the chart, use the legend gallery. It is where you can refer for something based on the graph or table or data.</span>
Here are the following choices:
a. Formulas tab
b. Review tab
c. Legend gallery
d.Legend style
5 0
4 years ago
Other questions:
  • Which command would you use to move a file from one location to another?
    6·2 answers
  • DPI stands for _____.
    14·1 answer
  • What is diffie-hellman most commonly used for?
    15·1 answer
  • Describe how the spoofing attack can affect multiple network layers (application, transport, network, and data link layers).
    14·1 answer
  • How to turn off new macbook pro when it is frozen 2017
    11·2 answers
  • How computational thinking skills impact software design and the quality of the software applications produced?
    10·1 answer
  • The roman structure that features heavy use of arches and columns is the _______.
    6·1 answer
  • Calculating mean for even number and use while loop<br>pleas help me ​
    6·1 answer
  • Write a print statement that displays a random integer between 5 and 5000. Assume the random library is imported.
    12·1 answer
  • Create a Python script that will compare two (2) numbers entered by the user. Refer to the attached image and to the following a
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!